Loading…

The Next Security Frontier: Taking the Mystery Out of the Supply Chain

The modern technology supply chain is highly complex. Throughout the various stages of design, manufacture, assembly, transport, and operation, a compute device is subject to tampering (malicious or otherwise). This exposes end users and consumers of compute devices to a variety of risks at varying...

Full description

Saved in:
Bibliographic Details
Published in:IEEE MICRO 2021-05, Vol.41 (3), p.103-107
Main Authors: Mattioli, Michael, Garrison, Tom, Patel, Baiju V.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The modern technology supply chain is highly complex. Throughout the various stages of design, manufacture, assembly, transport, and operation, a compute device is subject to tampering (malicious or otherwise). This exposes end users and consumers of compute devices to a variety of risks at varying levels of impact. Two potential technology solutions, which aim to provide transparency and insight into the systems in use, are proposed. The success and adoption of these choices, or any other solutions developed, is highly dependent on the participation of ecosystem partners such as foundries, original device manufacturers (ODMs), and original equipment manufacturers (OEMs).
ISSN:0272-1732
1937-4143
DOI:10.1109/MM.2021.3072174